GALLETTA, LETTERIO
 Distribuzione geografica
Continente #
EU - Europa 8.106
NA - Nord America 5.605
AS - Asia 2.662
SA - Sud America 595
AF - Africa 69
OC - Oceania 17
Continente sconosciuto - Info sul continente non disponibili 15
Totale 17.069
Nazione #
RU - Federazione Russa 5.955
US - Stati Uniti d'America 5.461
CN - Cina 809
SG - Singapore 749
IT - Italia 607
BR - Brasile 482
SE - Svezia 253
VN - Vietnam 248
GB - Regno Unito 226
HK - Hong Kong 223
DE - Germania 191
UA - Ucraina 175
IE - Irlanda 171
TR - Turchia 161
FR - Francia 159
IN - India 121
CA - Canada 99
IL - Israele 82
BG - Bulgaria 77
KR - Corea 53
NL - Olanda 47
AR - Argentina 42
BD - Bangladesh 36
IQ - Iraq 35
BE - Belgio 33
MX - Messico 33
ES - Italia 32
FI - Finlandia 30
PL - Polonia 28
AT - Austria 27
JP - Giappone 21
RS - Serbia 21
EC - Ecuador 19
CO - Colombia 18
DK - Danimarca 16
SA - Arabia Saudita 16
AU - Australia 15
ID - Indonesia 15
ZA - Sudafrica 15
EU - Europa 14
KE - Kenya 12
PK - Pakistan 11
MA - Marocco 10
MY - Malesia 10
HU - Ungheria 9
RO - Romania 9
LT - Lituania 8
PH - Filippine 8
UZ - Uzbekistan 8
VE - Venezuela 8
ET - Etiopia 7
NP - Nepal 7
CL - Cile 6
JO - Giordania 6
PE - Perù 6
CH - Svizzera 5
GR - Grecia 5
IR - Iran 5
PY - Paraguay 5
TN - Tunisia 5
AE - Emirati Arabi Uniti 4
AZ - Azerbaigian 4
KZ - Kazakistan 4
NO - Norvegia 4
PA - Panama 4
PT - Portogallo 4
TH - Thailandia 4
UY - Uruguay 4
AL - Albania 3
BO - Bolivia 3
EG - Egitto 3
LB - Libano 3
LU - Lussemburgo 3
OM - Oman 3
PS - Palestinian Territory 3
SI - Slovenia 3
UG - Uganda 3
AO - Angola 2
CR - Costa Rica 2
CY - Cipro 2
DO - Repubblica Dominicana 2
JM - Giamaica 2
KW - Kuwait 2
NG - Nigeria 2
SN - Senegal 2
SR - Suriname 2
A2 - ???statistics.table.value.countryCode.A2??? 1
AM - Armenia 1
BF - Burkina Faso 1
CG - Congo 1
CI - Costa d'Avorio 1
CM - Camerun 1
CZ - Repubblica Ceca 1
DZ - Algeria 1
GA - Gabon 1
GE - Georgia 1
HR - Croazia 1
IS - Islanda 1
KG - Kirghizistan 1
KH - Cambogia 1
Totale 17.056
Città #
Moscow 1.647
Ashburn 1.162
Dallas 508
Chandler 465
San Jose 402
Singapore 389
Jacksonville 352
Beijing 349
Hefei 252
San Mateo 234
Boardman 232
Dublin 169
Hong Kong 160
Los Angeles 114
New York 107
Milan 103
Council Bluffs 96
São Paulo 96
Dong Ket 93
Wilmington 84
Tel Aviv 80
Kocaeli 78
Lauterbourg 78
Sofia 76
Shanghai 70
Ann Arbor 67
Andover 66
Lawrence 65
Princeton 65
Istanbul 63
Rome 62
London 58
Chicago 56
Seoul 50
Orem 49
Ho Chi Minh City 48
Hanoi 44
Ottawa 44
Houston 42
Ogden 42
Atlanta 40
Munich 38
Santa Clara 37
The Dalles 35
Columbus 32
Chennai 30
Florence 29
Stockholm 25
Warsaw 24
Denver 23
Pisa 23
Brussels 22
Genoa 22
Barnet 21
Helsinki 21
Woodbridge 21
Amsterdam 20
Rio de Janeiro 19
Seattle 19
Tokyo 19
Montreal 17
Toronto 17
Belgrade 16
Brooklyn 16
Vienna 16
Mexico City 15
Nuremberg 15
Poplar 15
Boston 14
Naaldwijk 14
Düsseldorf 13
Frankfurt am Main 13
Manchester 13
Mumbai 13
Redwood City 13
Baghdad 12
Fairfield 12
Quito 12
Nairobi 11
Pesaro 11
Belo Horizonte 10
Bologna 10
Johannesburg 10
Secaucus 10
Haiphong 9
Turku 9
Valencia 9
Ankara 8
Assago 8
Bolzaneto 8
Brasília 8
Budapest 8
Dhaka 8
Livorno 8
Lucca 8
Nanjing 8
Turin 8
Charlotte 7
Da Nang 7
Goiânia 7
Totale 9.183
Nome #
28th International Conference on Principles of Distributed Systems 406
Securing Interruptible Enclaved Execution on Small Microprocessors 312
A brief tour of formally secure compilation 290
A type language for message passing component-based systems 288
A context-oriented extension of F# 285
A Two-Component Language for Adaptation: Design, Semantics, and Program Analysis 273
An Abstract Interpretation Framework for Type and Effect Systems 268
MUAC: Access control language for mutual benefits 268
A Two-Phase Static Analysis for Reliable Adaptation 264
A Reconstruction of a Types-and-Effects Analysis by Abstract Interpretation 262
An Abstract Semantics for Inference of Types and Effects in a Multi-Tier Web Language 261
Here you can't: context-aware security 257
Checking the Expressivity of Firewall Languages 253
A Step Towards Checking Security in IoT 252
Where Do Your IoT Ingredients Come From? 245
VeriOSS: Using the Blockchain to Foster Bug Bounty Programs 245
A Two-Component Language for COP 244
From firewalls to functions and back 243
A semantics for disciplined concurrency in COP 243
A theory of transaction parallelism in blockchains 243
Stochastic modeling and analysis of the bitcoin protocol in the presence of block communication delays 241
FWS: Analyzing, maintaining and transcompiling firewalls 237
Can my Firewall System Enforce this Policy? 232
Safe adaptation through implicit effect coercion 230
Control-flow flattening preserves the constant-time policy 228
Private-Yet-Verifiable Contact Tracing 228
Formalising Security in Ubiquitous and Cloud Scenarios 225
Are all firewall systems equally powerful? 224
Security in Pervasive Applications: A Survey 223
Sustainable precision agriculture from a process algebraic perspective: A smart vineyard 222
Types for Coordinating Secure Behavioural Variations 217
Systems Security Modeling and Analysis at IMT Lucca 216
Securing IoT communications: at what cost? 215
Linguistic Mechanisms for Context-Aware Security 215
Firewall Management With FireWall Synthesizer 214
Using standard typing algorithms incrementally 214
Event-driven adaptation in COP 211
Context-aware security: Linguistic mechanisms and static analysis 210
Typing context-dependent behavioural variations 210
Securing SATCOM user segment: A study on cybersecurity challenges in view of IRIS2 208
Last Mile’s Resources 208
From Natural Projection to Partial Model Checking and Back 208
Formally verifying security protocols built on watermarking and jamming 205
A Policy Framework for Regulating External Calls in Smart Contracts 203
IFCIL: An Information Flow Configuration Language for SELinux 203
The cost of securing IoT communications 203
Typing Context-Dependent Behavioural Variation 199
A Minimal Core Calculus for Solidity Contracts 199
A type language for distributed reactive components governed by communication protocols 193
Towards effective preservation of robust safety properties 191
Measuring security in IoT communications 189
A True Concurrent Model of Smart Contracts Executions 189
A Netting Protocol for Liquidity-saving Automated Market Makers 187
Experimenting with a Context-Aware Language 184
Language-Independent Synthesis of Firewall Policies 184
Framework, Tools and Good Practices for Cybersecurity Curricula 184
Robust Declassification by Incremental Typing 183
Tracking sensitive and untrustworthy data in IoT 183
Tool Supported Analysis of IoT 181
Programming in a context-aware language 179
Software security: The language approach 176
Transcompiling firewalls 176
Revealing the trajectories of KLAIM tuples, statically 176
Tracing where IoT data are collected and aggregated 174
Provably Secure Isolation for Interruptible Enclaved Execution on Small Microprocessors 173
A Logic for Policy Based Resource Exchanges in Multiagent Systems 170
Resilience of Hybrid Casper under varying values of parameters 170
Analysing the Provenance of IoT Data 168
Specifying and Verifying Information Flow Control in SELinux Configurations 166
Tracking data trajectories in IoT 166
IT-Covid19-IT: la risposta della comunità informatica italiana alla pandemia 166
Mechanical incrementalization of typing algorithms 164
Explainable Ponzi Schemes Detection on Ethereum 159
Security Metrics at Work on the Things in IoT Systems 154
Verifying a Blockchain-Based Remote Debugging Protocol for Bug Bounty 154
Covid19/IT the digital side of Covid19: A picture from Italy with clustering and taxonomy 149
Modelling and analysing IoT systems 149
A Comparison of Hosting Techniques for Online Cybersecurity Competitions 145
Risk Estimation in IoT Systems 130
Space cybersecurity governance: assessing policies and frameworks in view of the future European space legislation 123
X-SPIDE: an eXplainable machine learning pipeline for detecting smart Ponzi contracts in ethereum 120
Welcome back: a systematic literature review of smart contract reentrancy and countermeasures 62
ParserHunter: identify parsing functions in binary code 62
Checking Information Flow in Cloud-based IoT Access Control Policies 55
Differential Verification of Information Flow in SEAndroid Policies 44
When obfuscations preserve constant-time 23
Policies for Fair Exchanges of Resources 23
WalkthroughCyber: teaching cyber-awareness in Montessori middle schools 22
Netting-based liquidity-saving automated market makers 18
Natural Projection as Partial Model Checking 9
Detecting memory errors in rust programs including unsafe foreign code 6
Totale 17.329
Categoria #
all - tutte 65.988
article - articoli 0
book - libri 0
conference - conferenze 0
curatela - curatele 0
other - altro 0
patent - brevetti 0
selected - selezionate 0
volume - volumi 0
Totale 65.988


Totale Lug Ago Sett Ott Nov Dic Gen Feb Mar Apr Mag Giu
2020/2021438 0 0 0 0 0 0 0 0 0 184 54 200
2021/2022816 150 4 64 18 61 23 180 93 27 25 124 47
2022/20231.267 174 76 31 166 116 148 13 86 190 58 190 19
2023/2024881 81 64 87 56 85 34 93 17 70 121 70 103
2024/20255.096 66 113 135 356 90 557 1.015 265 473 568 1.110 348
2025/20267.433 298 417 1.833 2.836 262 230 744 209 364 240 0 0
Totale 17.329